[ale] nasty UPNP bug allows EXTERNAL hackers INTERNAL access

Ron Frazier (ALE) atllinuxenthinfo at techstarship.com
Thu Feb 7 22:28:22 EST 2013


You're welcome.  Glad to help.

Sincerely,

Ron


Jay Lozier <jslozier at gmail.com> wrote:

>Ron
>
>Thanks for the link. My router was good.
>
>Jay
>
>On 02/07/2013 03:06 PM, Ron Frazier (ALE) wrote:
>> Hi all,
>>
>> I wanted to let you know about a nasty bug in the UPNP implementation
>
>> of millions of routers.  This could allow an external hacker free and
>
>> open access to your internal network.  I think this mainly applies to
>
>> home and small office routers, but this could apply to commercial
>ones 
>> as well.
>>
>> UPNP stands for Universal Plug and Play.  It is a feature of almost 
>> all routers that is usually on by default.  It allows things INTERNAL
>
>> to your network, like XBox game systems, Skype, DVR's and other
>things 
>> to OPEN HOLES for incoming communications through your firewall, 
>> usually without your knowledge or permission, and sometimes without 
>> your ability to monitor or control it.  This is designed to allow 
>> gamers, for example, to instantly participate in network gaming 
>> without configuring the router.  It generally doesn't require 
>> authentication, and assumes anyone making a UPNP request from within 
>> your network is trustworthy.  This, in itself, is somewhat of a 
>> security risk, and I've had UPNP turned off for years on my routers. 
>
>> It's one of the first things I disable when I set up a router, since
>I 
>> have no need for it.
>>
>> They discussed the new issue, which is much much worse, on the last 
>> two Security Now podcasts.
>>
>> http://twit.tv/sn
>> http://twit.tv/show/security-now/389
>> https://www.youtube.com/watch?v=wEa43qM4JjQ#t=09m44s  (Youtube video 
>> of 389.  Relevant part starts at 09:44.)
>> http://media.grc.com/sn/sn-389.mp3 - MP3 audio of 389.
>> http://twit.tv/show/security-now/390
>> http://www.grc.com/securitynow.htm  (Episode 390 hasn't been posted 
>> here yet, but should be shortly.)
>>
>> UPNP was always intended to be used only on your INTERNAL LAN.  It
>was 
>> never intended to be exposed on the Internet on the WAN.  A group of 
>> security researchers at Rapid7 spent months last year using bots to 
>> probe EVERY routable IPv4 address on the Internet. They sent UDP UPNP
>
>> discovery packets to every address several times.  The results of the
>
>> probes were both surprising and very disconcerting.
>>
>> They found that 2.2% of ALL IPv4 routers exposed to the internet 
>> responded to UPNP discovery requests.  This corresponds to 81 MILLION
>
>> routers.  This means that they are exposing the UPNP service to the 
>> EXTERNAL internet at large.  This is a MAJOR security flaw.  Of
>those, 
>> 20%, or 16.2 MILLION are exposing their SOAP API to the EXTERNAL 
>> internet at large.
>>
>> This means that a REMOTE cracker, just by sending a few UDP packets
>to 
>> your router's EXTERNAL address, can punch holes in your firewall and 
>> break into your INTERNAL LAN just as though he was your XBOX sitting 
>> in your house.  It requires no authentication or decryption on the 
>> cracker's part, and is trivially easy.
>>
>> This is very bad news for the 81 million people, most of which, don't
>
>> even know they are vulnerable.
>>
>> For years, Steve Gibson has been operating the Shields Up service on 
>> his website.  It provides a way to scan your network from the outside
>
>> to see if net bios is being exposed, or if common TCP service ports 
>> are being exposed.  In light of these events, he has added testing
>for 
>> the UPNP vulnerability.
>>
>> I would recommend that each person reading this make use of Steve's 
>> port scanner to test your router's external IPv4 address to determine
>
>> if you are vulnerable to the UPNP attack vector. Here's how.
>>
>> Go to the Shields Up main page at:
>https://www.grc.com/x/ne.dll?bh0bkyd2
>>
>> You will probably have to trust grc.com in noscript, etc. for 
>> everything to work.  Read what it says there and click proceed. Keep 
>> in mind, some of the verbiage is a decade old, but the site is still 
>> very useful.  The stuff related to UPNP is new.
>>
>> Once you're on the second page, you will get to a screen with some 
>> menu buttons on it.
>>
>> Click the orange GRC's Instant UPNP Exposure Test button.
>>
>> His server will query the UPNP ports for your external IPv4 address. 
>
>> It will then report back as to whether your router didn't respond at 
>> all (PREFERABLE), actively rejected the remote request (OK), or did 
>> respond to the UPNP discovery request (BAD). The result page also 
>> contains verbiage explaining the results.
>>
>> Note that a simple port scan, like from nmap, will not do the trick 
>> here.  First, you have to send the scan from outside your router, on 
>> the internet side.  Second, the UPNP discovery request is a 
>> specifically formatted UDP packet, not just a simple ping. Since it's
>
>> UDP, the source address can be spoofed by a cracker.
>>
>> If your router is in the category that did respond, you are 
>> potentially vulnerable to attack.  At the very least, a cracker could
>
>> find out that your UPNP service is listening on the WAN, and it will 
>> probably tell him which UPNP stack you have in its reply. This may 
>> give him the info he needs to attack you.  If your router is among
>the 
>> 1 in 5 (of the 81 million) that exposes its SOAP API to the WAN, you 
>> are vulnerable to immediate attack.  If your router responds to an 
>> external UPNP request, which it NEVER should, you should find a way
>to 
>> turn off that functionality and retest it.  If you cannot turn it
>off, 
>> you should discontinue using this router.
>>
>> While you're there on the Shields Up page, you can select other 
>> buttons as follows:
>>
>> File Sharing - tests to see if your router is exposing any net bios 
>> file sharing ports to the WAN.
>> Common Ports - tests to see if certain commonly used TCP service
>ports 
>> are listening on the WAN.
>> All Service Ports - tests to see if the first 1056 TCP service ports 
>> are listening on the WAN
>> User Specified Custom Port Probe - used to test a specific TCP port 
>> number after entering it into the blank.
>> Lookup Specific Port Information - used to lookup data about what 
>> certain port numbers are commonly used for.
>>
>> Here are other resources that Steve provides relative to the UPNP 
>> problem so you can research it:
>>
>>
>https://community.rapid7.com/servlet/JiveServlet/download/2150-1-16596/SecurityFlawsUPnP.pdf
>
>>
>> http://toor.do/DEFCON-19-Garcia-UPnP-Mapping-WP.pdf
>> http://www.upnp-hacks.org/upnp.html
>> http://toor.do/upnp.html
>>
>http://www.h-online.com/security/news/item/Millions-of-devices-vulnerable-via-UPnP-Update-1794032.html
>
>>
>>
>> I recommend that you test your internet facing IPv4 addresses for
>UPNP 
>> vulnerability immediately.  If your router responds to the external 
>> UPNP inquiry, I suggest turning off UPNP from its control panel and 
>> retesting.  If it still responds, consider upgrading the firmware and
>
>> retesting, or removing and replacing the router.
>>
>> I hope you find this information useful.
>>
>> Sincerely,
>>
>> Ron
>>
>>


--

Sent from my Android Acer A500 tablet with bluetooth keyboard and K-9 Mail.
Please excuse my potential brevity.

(To whom it may concern.  My email address has changed.  Replying to former
messages prior to 03/31/12 with my personal address will go to the wrong
address.  Please send all personal correspondence to the new address.)

(PS - If you email me and don't get a quick response, you might want to
call on the phone.  I get about 300 emails per day from alternate energy
mailing lists and such.  I don't always see new email messages very quickly.)

Ron Frazier
770-205-9422 (O)   Leave a message.
linuxdude AT techstarship.com




More information about the Ale mailing list